passphrase quality
Peter W
peterw at usa.net
Sat Nov 17 08:47:18 EST 2001
On Fri, Nov 16, 2001 at 09:41:07PM +0100, Tim McGarry wrote:
> I'm having difficulty educating the users on the systems that I administer
> to choose a sensible passphrase
> I think some versions of PGP comment on passphrase quality, perhaps this
> would be worth having in OpenSSH, maybe giving the user the oportunity to
> try again if there phrase isn't good enough
In many Linux-based operating environments, this is enforced via PAM and the
pam_cracklib library. You might lok at that; I think it makes more sense to
do the testing there than inside OpenSSH.
Or do you mean passphrases for their RSA/DSA private keys? If that's the
case, I think the idea might be to PAM-ify ssh-keygen, though
1) there are legitimate reasons/occasions for keys w/o passphrases
2) since the user always controls their own private SSH key files,
there's nothing preventing them from modifying the key with their
own version of ssh-keygen
So the best you could hope for is a warning.
if (strlen(requestedPass) > 0 ) { askPamIfItIsAlright(); } /* kinda */
This is part of the "problem" with keypair auth & decentralized
configuration. Like ~/.rhosts, pretty much if you enable the mechanism,
it's impossible to control. Actually private keypairs are harder to control
than ~/.rhosts, since users can specify *any* file with the -i option.
-Peter
More information about the openssh-unix-dev
mailing list